From SMT Solvers to Verifiers
ABSTRACT Aws Albarghouthi License: Creative Commons 2.5 read more
View ArticleTechniques for Scalable Symbolic Simulation
ABSTRACTSymbolic simulation is a powerful technique for building mathematical models describing a program's results by simulating execution while interpreting inputs as symbolic variables. Such models...
View ArticleUsing model checking for Trivial File Transfer Protocol validation
Alrabaee, S., Bataineh, A., Khasawneh, F.A., Dssouli, R.. 2014. Using model checking for Trivial File Transfer Protocol validation. Communications and Networking (ComNet), 2014 International...
View ArticleSemantics of Optimization for Real-Time Intelligent Embedded Systems (SORTIES)
Abstract:Optimization algorithms used in a real-time and safety-critical context offer the potential for considerably advancing robotic and autonomous systems by improving their ability to execute...
View ArticleFrom SMT Solvers to Verifiers
ABSTRACT Aws Albarghouthi License: Creative Commons 2.5 read more
View ArticleTechniques for Scalable Symbolic Simulation
ABSTRACTSymbolic simulation is a powerful technique for building mathematical models describing a program's results by simulating execution while interpreting inputs as symbolic variables. Such models...
View ArticleUsing model checking for Trivial File Transfer Protocol validation
Alrabaee, S., Bataineh, A., Khasawneh, F.A., Dssouli, R.. 2014. Using model checking for Trivial File Transfer Protocol validation. Communications and Networking (ComNet), 2014 International...
View ArticleSemantics of Optimization for Real-Time Intelligent Embedded Systems (SORTIES)
Abstract:Optimization algorithms used in a real-time and safety-critical context offer the potential for considerably advancing robotic and autonomous systems by improving their ability to execute...
View ArticleStatic analysis for web service security - Tools amp; techniques for a secure...
Masood, A., Java, J.. 2015. Static analysis for web service security - Tools amp; techniques for a secure development life cycle. 2015 IEEE International Symposium on Technologies for Homeland...
View ArticleHACL*: A Verified Modern Cryptographic Library
Zinzindohoué, Jean-Karim, Bhargavan, Karthikeyan, Protzenko, Jonathan, Beurdouche, Benjamin. 2017. HACL*: A Verified Modern Cryptographic Library. Proceedings of the 2017 ACM SIGSAC Conference on...
View ArticleSafe and Efficient Cyber-Physical Operation System for Construction Equipment
Mani Golparvar-Fard Chimay Anumba Timothy Bretl John Messner License: Creative Commons 2.5
View ArticleImproved Invariant Generation for Industrial Software Model Checking of Time...
Todorov, Vassil, Taha, Safouan, Boulanger, Frédéric, Hernandez, Armando. 2019. Improved Invariant Generation for Industrial Software Model Checking of Time Properties. 2019 IEEE 19th International...
View ArticleSoftware Safety Verification Framework based on Predicate Abstraction
Haowei, Liang, Chunyan, Hou, Jinsong, Wang, Chen, Chen. 2021. Software Safety Verification Framework based on Predicate Abstraction. 2021 IEEE 45th Annual Computers, Software, and Applications...
View Article